Physical Security Policy Essay

749 words - 3 pages

Associate Level Material
Appendix E

Physical Security Policy

Student Name: xxxxxxxxxxx

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: xxxxxxxxx

Date: 4.14.13

Physical Security Policy

1 Security of the building facilities

1 Physical entry controls

Like we have in our company, everyone must have an ID Swipe card (smart Card), they must swipe the card coming into and going out of the building. These ...view middle of the document...

2 Security of the information systems

1 Workplace protection

We always have several servers up and running all thru the night, we have several power sources so there is enough power that is needed for the security systems as well as the alarm and camera systems.

2 Unused ports and cabling

Unused ports will be shut off or disabled, all Cabling will be locked away in a section in the IT department This will provent anyone using a port or Cable that they are not suppose to use.

3 Network/server equipment

Our IT department has an area that has two types of security; our servers are not only locked down by software but also behind an electronic key lock. This prevents anyone from messing with the system. Or stealing anything off the system. Only the IT dept. has Admin rights to get into the room and onto the systems.

4 Equipment maintenance

When a new person is hird we order a new computer, the IT sets it up with software and hardware pertaining to what the employee’s job description is. Along with Hardware and Software the IT also sets up passwords for the employee. As things go wrong on the computer the IT will check your machine over and...

Other Papers Like Physical Security Policy

Linux Security Essay

448 words - 2 pages and improving security. • security policy; • organization of information security; • asset management; • human resources security; • physical and environmental security; • communications and operations management; • access control; • information systems acquisition, development and maintenance; • information security incident management; • business continuity management; • Compliance. ISO/IEC 27001 is an internationally

Security Policy Document Essay

2165 words - 9 pages acceptable use policy would be necessary for GDI because even with the greats security programs and technologies, internal threats still exist. Employees impose a great threat to the company network and could bring the network crashing down if not address properly. “Internal threat is predominantly the result of poor user security behavior” (Humaidi, 2011). Having an acceptable use policy helps control employee’s behavior. 3.0 Physical Security

Chapter 1-Introduction to Information Security: Principles of Information Security

979 words - 4 pages regards to the information security. 4. What type of security was dominant in the early years of computing? Early security was entirely physical security. - EX: Lock and Key 5. What are the 3 components of the CIA triangle and what are they used for? Confidentiality: Information should only be accessible to its intended recipients. Integrity: Information should arrive the same as it was sent. Availability: Information should be

Access Control Methods for Companies

614 words - 3 pages secures information by assigning security levels to information and security clearances to users. The data’s security level indicates its sensitivity. All users have access to only the data for which they have a clearance. This allows for enforcement of a good security policy. 4. Backordered Parts is a defense contractor that builds communications parts for the military. All employees communicate using smartphones and email. I would apply Physical

It Audit Guide

4838 words - 20 pages 2.4. Selecting an Information System’s Security Controls 7 3. Purpose of the Checklist 8 4. How to Use the Checklist 8 4.1. The Checklist Structure 8 4.2. Security Objectives 9 4.3. Guidance for IRAP Assessors 9 4.4. Information System Compliance 10 5. Guidance for IRAP Assessors 10 6. The Checklist 11 6.1. The Information Security Policy & Risk Management 11 6.2. Information Security Organisation 14 6.3

It Security

2097 words - 9 pages Information Security Policy University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Mark Cherry Date: 03/11/2012 * Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security

Comparision Pape

1865 words - 8 pages each entities job responsibilities. Both private security and public policing personnel must adhere to the policies and procedures set forth by its organization. Private security organizations have 10 essential policies that the agency must follow. Those essential policies are as follows: acceptable use policy, privacy policy, password policy, disposal and destruction policy, storage and retention policy, incident response policy

Internal and External Security

1604 words - 7 pages Internal and External Security BIS/303 September 16, 2013 Internal and External Security Most hotels offer exceptional service and a quality stay, but the hotels have to look at the internal and external security issues that are a major concern. Internal security issues, such as spiteful users of the business using one of the information technology applications within the company. Beside the physical security, hotels have external

Cyberlaw, Regulations and Compliance

1323 words - 6 pages     Task 1 Heart Healthy Information Security Policy: A. 1. The policy for information security has two different sections – first is managing passwords and second is new user policy. They are discussed in detail as below: New Users: When a new user enters the organization, depending upon the roles and responsibilities assigned to the person, he will be given corresponding access rights. With the help of these access rights the

Security Assessment

2610 words - 11 pages management controls, we will observe organizational processes that are designed and implemented to reduce risk to the organization by using the role of the manager to enforce policy compliance. This organization has implemented an Information Security Program (ISP), which is a management system that represents the policies and controls implemented within an organization. Part of this program is effective because it provides both management and users with

Life Insurance Collateral in New York

1747 words - 7 pages endorsement and recording are not necessary to create the security interest and may create rights only against the insurer.2 The owner's physical delivery of a policy to a creditor may also create a security interest.3 Notwithstanding Section 5-701(a)(9) of the General Obligations Law, which requires a written assignment of insurance policy and voids an oral assignment, a pledge by physical delivery of the original policy need not be accompanied by a

Related Essays

Is4550 Week 5 Lab Essay

1642 words - 7 pages ) for each of the following policy definitions that are needed to remediate the identified gap analysis for the IT security policy framework: 1. Access Control Policy Definition: The access control policy outlines the controls placed on both physical access to the computer system (that is, having locked access to where the system is stored) and to the software in order to limit access to computer networks and data. Access control policies

Cmgt400 Week 4 Individual Essay

1359 words - 6 pages providing an almost impenetrable web of safety. “A continuously updated security policy must state how a company plans to protect its physical and information technology assets by specifying changes in technology and employee requirements” (Rouse, 2005). An information security policy must include an acceptable use policy that users must agree to follow so that they are provided access to the network. The policy must explain how security

Course Discription Essay

968 words - 4 pages Objectives 1.1 Recognize the importance of IT security implementation. 1.2 Identify major security issues associated with physical and operating system security. 1.3 Describe basic advantages and disadvantages among the various security implementations. Course Preparation Read the course description and objectives. Review the Learning Team Toolkit. NOTE: TestOut LabSims are available for this course. See Week One, Course Materials Page

Introduction To Information Security Student Essay

1249 words - 5 pages Security –The 1960 –The 1970 to 80 –The 1990 –2000 to present The History of Information Security The need for computer security — that is, the need to secure physical locations, hardware, and software from threats arose during World War II when the first mainframes, developed to aid computations for communication code breaking were put to use The History of Information Security 嗗 Multiple levels of security were implemented to protect these